zkFHE / FHE-in-TEELinks
A framework to run Fully Homomorphic Encryption computations (especially using the SEAL library) on Trusted Execution Environments, with untrusted hardware acceleration
☆45Updated 2 years ago
Alternatives and similar repositories for FHE-in-TEE
Users that are interested in FHE-in-TEE are comparing it to the libraries listed below
Sorting:
- Proof-of-concept implementation of the papers on scalable collaborative zk-SNARKs (coZK) with applications to private proof delegation.☆52Updated this week
- Zk proving the correct execution of encryption operation under BFV Fully Homomorphic Encryption scheme☆113Updated last year
- ☆27Updated 2 years ago
- Verifiable and confidential computation based on ZKP and FHE, powered by risc0 zkVM.☆83Updated 2 years ago
- Verifiable FHE prototype☆25Updated 11 months ago
- An implementation of the Rinocchio protocol (SNARK for Ring Arithmetic) over SEAL FHE ring elements☆38Updated last year
- Let's go https://eprint.iacr.org/2022/1763.pdf☆61Updated 2 years ago
- lattice-based zkSNARKs over libsnark [ISW21]☆34Updated 9 months ago
- A prototype implementation of the zksaas protocol for distributed zkSNARK generation☆27Updated last year
- Prototype implementations of various Collaborative zkSNARKs.☆126Updated 2 months ago
- ☆43Updated 5 months ago
- zero knowledge proof aggregator for general circuit☆72Updated last year
- An elastic proof system based on arkworks☆84Updated last year
- ☆26Updated last year
- cuZK: An Efficient GPU Implemetation of zkSNARK☆30Updated last year
- ☆59Updated 3 years ago
- DPC with Universal Setup☆46Updated 2 years ago
- ☆36Updated last week
- ☆58Updated 2 months ago
- Libra zero knowledge proof system☆53Updated 2 years ago
- ☆41Updated last year
- Ecne: An engine for verifying the soundness of R1CS constraints☆111Updated 3 years ago
- ☆76Updated 7 months ago
- Extensive benchmarks of various zero-knowledge proof systems for Fully Homomorphic Encryption☆43Updated 3 months ago
- ☆27Updated 2 months ago
- ☆18Updated 10 months ago
- Nova: Recursive SNARKs without trusted setup☆43Updated last year
- polynomial commitments from linear codes☆46Updated 7 months ago
- Reference implementation in Python of Poseidon and optimized Poseidon (Neptune) hash functions☆82Updated last year
- Oblivious key-value store based on Circuit ORAM☆29Updated 4 months ago